Michalis Pavlidis
Orcid: 0000-0001-9135-2340
According to our database1,
Michalis Pavlidis
authored at least 38 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Evol. Syst., February, 2024
2023
Neural Comput. Appl., October, 2023
Expert Syst. Appl., May, 2023
Proceedings of the Engineering Applications of Neural Networks, 2023
2022
Digit., January, 2022
HamDroid: permission-based harmful android anti-malware detection using neural networks.
Neural Comput. Appl., 2022
TrojanDroid: Android Malware Detection for Trojan Discovery Using Convolutional Neural Networks.
Proceedings of the Engineering Applications of Neural Networks, 2022
2021
J. Data Intell., 2021
2020
Proceedings of the Visual Privacy Management, 2020
Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach.
Softw. Syst. Model., 2020
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020
From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks.
Evol. Syst., 2020
Proceedings of the WIMS 2020: The 10th International Conference on Web Intelligence, Mining and Semantics, Biarritz, France, June 30, 2020
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
2019
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
2018
Cyber-attack path discovery in a dynamic supply chain maritime risk management system.
Comput. Stand. Interfaces, 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
Proceedings of the ER Forum 2017 and the ER 2017 Demo Track co-located with the 36th International Conference on Conceptual Modelling (ER 2017), Valencia, Spain,, 2017
Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction.
Proceedings of the Engineering Applications of Neural Networks, 2017
Proceedings of the Forum and Doctoral Consortium Papers Presented at the 29th International Conference on Advanced Information Systems Engineering, 2017
Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
2015
Proceedings of the Risks and Security of Internet and Systems, 2015
2014
Int. J. Inf. Syst. Model. Des., 2014
2013
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
2012
Dealing with trust and control: A meta-model for trustworthy information systems development.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012
Proceedings of the Advanced Information Systems Engineering Workshops, 2012
2011
A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos.
Proceedings of the IS Olympics: Information Systems in a Diverse World, 2011
SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011
Proceedings of the CAiSE Doctoral Consortium 2011, London, United Kingdom, June 21, 2011, 2011